default search action
ISPEC 2005: Singapore
- Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou:
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings. Lecture Notes in Computer Science 3439, Springer 2005, ISBN 3-540-25584-2
Network Security
- Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann:
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. 1-12 - Philip Robinson, Christian Schaefer, Thomas Walter:
POSSET - Policy-Driven Secure Session Transfer. 13-24 - Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati:
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. 25-35 - Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh:
Robust Routing in Malicious Environment for Ad Hoc Networks. 36-47
Cryptographic Techniques I
- Patrick P. Tsang, Victor K. Wei:
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. 48-60 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Tracing Traitors by Guessing Secrets. The q-Ary Case. 61-73 - Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim:
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. 74-84 - Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau:
Countermeasures for Preventing Comb Method Against SCA Attacks. 85-96
Secure Architecture I
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. 97-108 - Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu:
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. 109-120 - Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang:
Security On-demand Architecture with Multiple Modules Support. 121-131 - Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes:
Measuring Resistance to Social Engineering. 132-143
Access Control
- Frode Hansen, Vladimir A. Oleshchuk:
Conformance Checking of RBAC Policy and its Implementation. 144-155 - Kung Chen, Chih-Mao Huang:
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. 156-167 - Xu Liao, Li Zhang, Stephen Chi-fai Chan:
A Task-Oriented Access Control Model for WfMS. 168-177
Intrusion Detection
- Zonghua Zhang, Hong Shen:
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. 178-191 - Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari:
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. 192-203 - André Adelsbach, Sebastian Gajek, Jörg Schwenk:
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. 204-216 - Zhuowei Li, Amitabha Das, Sabu Emmanuel:
Model Redundancy vs. Intrusion Detection. 217-229
Applications and Case Studies
- Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble:
An Open Approach for Designing Secure Electronic Immobilizers. 230-242 - Mikael Linden, Inka Vilpola:
An Empirical Study on the Usability of Logout in a Single Sign-on System. 243-254 - André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Secure Software Delivery and Installation in Embedded Systems. 255-267 - Joseph K. Liu, Duncan S. Wong:
A Restricted Multi-show Credential System and Its Application on E-Voting. 268-279
Secure Architecture II
- Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein:
Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. 280-292 - Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai:
Using Trust for Restricted Delegation in Grid Environments. 293-301 - Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang:
Computer Vulnerability Evaluation Using Fault Tree Analysis. 302-313 - Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li:
An Identity-Based Grid Security Infrastructure Model. 314-325
Data Security
- Ahmad-Reza Sadeghi, Christian Stüble:
Towards Multilateral-Secure DRM Platforms. 326-337 - Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin:
Hiding Data in Binary Images. 338-349 - Yanmei Fang, Limin Gu, Jiwu Huang:
Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. 350-361 - Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu:
Protecting Mass Data Basing on Small Trusted Agent. 362-373
Cryptographic Techniques II
- Zuowen Tan, Zhuojun Liu, Mingsheng Wang:
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. 374-385 - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Token-Controlled Public Key Encryption. 386-397 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
A New Class of Codes for Fingerprinting Schemes. 398-409 - Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited. 410-421
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.